Deploying a Shadow Threat Intel Capability: Understanding YOUR Adversaries without Expensive Security Tools

Presented at THOTCON 0x7 (2016), May 6, 2016, 1 p.m. (25 minutes)

In the presentation that threat intel vendors do not want you to see, open source and internal data meets home grown resources to produce actionable threat intelligence that your organization can leverage to stop the bad guys. This presentation discusses and shows examples of using what your already have to bootstrap this capability using existing data management platforms with open and flexible schemas to ease identification of advanced threats. Specific topics covered include the advantages of using open and flexible platforms that can be molded into a data repository, a case tracking system, an indicator database, and more. By analyzing this data organizations can discovery trends across attacks that help them understand their adversaries. An example nosql schema will be release to help attendees create their own implementations.


Presenters:

  • grecs
    grecs has two decades of industry experience, undergraduate & graduate engineering degrees, and a really well known security certification.

Similar Presentations: